Cisco Cisco IOS Software Release 15.0(1)M
93
OL-20799-01 Rev. L0
Caveats
displayed in <CmdBold>show diag<noCmdBold>. But, the <CmdBold>show
diag<noCmdBold> has entry for all.
ceAssetOrderablePartNumber.16 = NM-1T3/E3=
ceAssetOrderablePartNumber.19 = SM-NM-ADPTR
ceAssetMfgAssyNumber.1 = 800-33013-01 <<<<<<< As per <CmdBold>show
diag<noCmdBold> output, the Assy Number for CISCO3945-CHASSIS is 800-31577-01
ceAssetMfgAssyNumber.3 = 800-33013-01
ceAssetMfgAssyNumber.11 = 800-30005-01
ceAssetMfgAssyNumber.14 = 800-30005-01
ceAssetMfgAssyNumber.16 = 800-19180-02
ceAssetMfgAssyNumber.19 = 800-30005-01
ceAssetMfgAssyRevision.1 = 08 <<<<< Should be A0
ceAssetMfgAssyRevision.3 = 08
ceAssetMfgAssyRevision.11 = 06 <<<<<<<<<<< Board revision is displayed for
SM-NM-Adapter, but <CmdBold>show diag<noCmdBold> does not have slot 1 information.
ceAssetMfgAssyRevision.14 =
ceAssetMfgAssyRevision.16 = A0
ceAssetMfgAssyRevision.19 =
•
CSCtl99174
Cisco IOS Software contains a memory leak vulnerability that could be triggered through the
processing of malformed Session Initiation Protocol (SIP) messages. Exploitation of this
vulnerability could cause an interruption of services. Only devices that are configured for SIP
inspection are affected by this vulnerability.
processing of malformed Session Initiation Protocol (SIP) messages. Exploitation of this
vulnerability could cause an interruption of services. Only devices that are configured for SIP
inspection are affected by this vulnerability.
Cisco has released free software updates that address this vulnerability. There are no workarounds
for devices that must run SIP inspection.
for devices that must run SIP inspection.
This advisory is available at the following link:
•
CSCto60258
Symptoms: Voice call may fail with MGCP controlled FXS port.
Conditions: Adding both commands mgcp default-package fxr-package and mgcp fax t38 inhibit
under MGCP may cause voice call to fail.
under MGCP may cause voice call to fail.
Workaround: Disable one of the commands under MGCP configuration.
•
CSCtz35999
The Cisco IOS Software Protocol Translation (PT) feature contains a vulnerability that could allow
an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are available.
This advisory is available at the following link:
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes
seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each
Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases
that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each
Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the
vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases
that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security
Advisory Bundled Publication” at the following link:
Advisory Bundled Publication” at the following link: